HOME   Cart(0)   Quotation   About-Us Policy PDFs Standard-List
www.ChineseStandard.net Database: 189759 (12 Oct 2025)

GB/T 36624-2018 PDF English

US$350.00 · In stock · Download in 9 seconds
GB/T 36624-2018: Information technology -- Security techniques -- Authenticated encryption
Delivery: 9 seconds. True-PDF full-copy in English & invoice will be downloaded + auto-delivered via email. See step-by-step procedure
Status: Valid
Standard IDContents [version]USDSTEP2[PDF] deliveryName of Chinese StandardStatus
GB/T 36624-2018English350 Add to Cart 0-9 seconds. Auto-delivery Information technology -- Security techniques -- Authenticated encryption Valid

Excerpted PDFs (Download full copy in 9 seconds upon purchase)

PDF Preview: GB/T 36624-2018
      

Similar standards

GB/T 36627   GB/T 36630.1   GB/T 36635   GB/T 36630.4   

GB/T 36624-2018: Information technology -- Security techniques -- Authenticated encryption

---This is an excerpt. Full copy of true-PDF in English version (including equations, symbols, images, flow-chart, tables, and figures etc.), auto-downloaded/delivered in 9 seconds, can be purchased online: https://www.ChineseStandard.net/PDF.aspx/GBT36624-2018
GB NATIONAL STANDARD OF THE PEOPLE’S REPUBLIC OF CHINA ICS 35.040 L 80 Information Technology - Security Techniques - Authenticated Encryption (ISO/IEC 19772.2009, MOD) Issued on. SEPTEMBER 17, 2018 Implemented on. APRIL 1, 2019 Issued by. State Administration for Market Regulation; Standardization Administration of the People’s Republic of China.

Table of Contents

Foreword... 3 1 Scope... 5 2 Normative References... 5 3 Terms and Definitions... 6 4 Symbols... 7 5 Overview... 8 6 Authenticated Encryption Mechanism 1... 9 7 Authenticated Encryption Mechanism 2... 11 8 Authenticated Encryption Mechanism 3... 15 9 Authenticated Encryption Mechanism 4... 17 10 Authenticated Encryption Mechanism 5... 19 Appendix A (normative) ASN.1 Module... 24 Appendix B (informative) Application Instructions for Authenticated Encryption Mechanisms... 25 Appendix C (informative) Data Examples... 29 Bibliography... 33

Foreword

This Standard was drafted in accordance with the rules in GB/T 1.1-2009. This Standard adopts the re-drafting law to modify the adoption of ISO/IEC 19772.2009 Information Technology - Security Techniques - Authenticated Encryption. In comparison with ISO/IEC 19772.2009, the technical differences and the causes for these differences are as follows. ---In regard to normative references, this Standard makes adjustments with technical differences, so as to adapt to the technical conditions of China. The adjustments are concentratedly reflected in Chapter 2 “Normative References”. The specific adjustments are as follows.  GB/T 15852.1-2008, which equivalently adopts the international standard, is used to replace ISO/IEC 9797-1 (see 8.4);  GB/T 17964-2008 is used to replace ISO/IEC 10116 (see 9.3);  GB/T 32907-2016 is used to replace ISO/IEC 18033-3 (see Chapter 5);  GB/T 25069-2010 is added to the references (see Chapter 3); ---In Chapter 3, terms and definitions that have already been defined in the current national standards are directly adopted; some common definitions are deleted. In comparison with ISO/IEC 19772.2009, there are relatively significant adjustments in structure. See the details below. ---The content of Scope in ISO/IEC 19772.2009 is modified; some content is transferred to Chapter 5 Overview; ---In consideration of the practical application scope of China’s national conditions technology, this Standard adopts the five authenticated encryption mechanisms specified in Chapter 7 ~ Chapter 11 in ISO/IEC 19772.2009; deletes the authenticated encryption mechanism specified in Chapter 6 in ISO/IEC 19772.2009; ---Normative Appendix C in ISO/IEC 19772.2009 is adjusted to Appendix A, correspondingly, Informative Appendix A and Appendix B in ISO/IEC 19772.2009 are respectively adjusted to Appendix B and Appendix C; ---The data example provided in Appendix C is modified to use SM4 algorithm as an example. This Standard makes the following editorial modification. ---The content of the corrected version of ISO/IEC 19772.2009 is included. Please be noted that certain content of this document might involve patents. The institution issuing this document does not undertake the responsibility of identifying these patents. This Standard was proposed by and shall be under the jurisdiction of National Technical Committee 260 on Information Technology Security of Standardization Administration of China (SAC/TC 260). The drafting organizations of this Standard. Data Assurance & Communications Security Center; Institute of Software Chinese Academy of Sciences; Beijing JN TASS Technology Co., Ltd. The main drafters of this Standard. Wang Qiongxiao, Cai Quanwei, Zhang Yingjun, Zhao Yuhang, Song Li, Wu Pengyi, Wennan, Lin Jingqiang, Jing Jiwu, Wang Mingyue, Song Tianlin. Information Technology - Security Techniques - Authenticated Encryption

1 Scope

This Standard specifies five authenticated encryption mechanisms, which achieve the following security objectives by defining the methods of processing a data string.

2 Normative References

The following documents are indispensable to the application of this document. In terms of references with a specified date, only versions with a specified date are applicable to this document. In terms of references without a specified date, the latest version (including all the modifications) is applicable to this document. GB/T 15852.1-2008 Information Technology - Security Techniques - Message Authentication Codes (MACs) - Part 1.Mechanisms Using a Block Cipher (ISO/IEC 9797-1.1999, IDT)

3 Terms and Definitions

What is defined in GB/T 15852.1-2008, GB/T 17964-2008 and GB/T 25069-2010, and the following terms and definitions are applicable to this document.

4 Symbols

The following symbols are applicable to this document.

5 Overview

The five authenticated encryption mechanisms specified in this Standard are all based on the block cipher algorithm. Meanwhile, the data originator and data recipient are required to share keys. 6 Authenticated Encryption Mechanism 1 The block cipher algorithm used in this mechanism shall be a 128-bit block cipher algorithm, namely, n = 128.This mechanism requires that the protected data D shall at least contain 128 bits, and the data length shall be an integer multiple of 64 bits [namely, len(D) = 64m, m > 1]. 7 Authenticated Encryption Mechanism 2 Before using this authenticated encryption mechanism, the data originator and data recipient shall firstly negotiate and determine the following matters. 8 Authenticated Encryption Mechanism 3 Before using this authenticated encryption mechanism, the data originator and recipient shall firstly determine the standard length t, in which, 0 < t ≤ n. The recipient shall execute the following steps to decrypt and verify the authenticated encrypted data C. 9 Authenticated Encryption Mechanism 4 Before using this authenticated encryption mechanism, the data originator and data recipient shall firstly negotiate and determine the following matters. 10 Authenticated Encryption Mechanism 5 Before using this authenticated encryption mechanism, the data originator and recipient shall firstly negotiate and determine the tag length t. The value of t shall be an integer multiple of 8 and satisfy 96 ≤ t ≤ 128 (under specific circumstances, the value of t may also be 32 or 64).

Appendix A

(normative) ASN.1 Module The five authenticated encryption mechanisms specified in this Standard are respectively corresponding to ae-mechanism2, ae-mechanism3, ae-mechanism4, ae- mechanism5 and ae-mechanism6 in the above ASN.1 definition. ......
Source: Above contents are excerpted from the full-copy PDF -- translated/reviewed by: www.ChineseStandard.net / Wayne Zheng et al.


      

Tips & Frequently Asked Questions

Question 1: How long will the true-PDF of English version of GB/T 36624-2018 be delivered?

Answer: The full copy PDF of English version of GB/T 36624-2018 can be downloaded in 9 seconds, and it will also be emailed to you in 9 seconds (double mechanisms to ensure the delivery reliably), with PDF-invoice.

Question 2: Can I share the purchased PDF of GB/T 36624-2018_English with my colleagues?

Answer: Yes. The purchased PDF of GB/T 36624-2018_English will be deemed to be sold to your employer/organization who actually paid for it, including your colleagues and your employer's intranet.

Question 3: Does the price include tax/VAT?

Answer: Yes. Our tax invoice, downloaded/delivered in 9 seconds, includes all tax/VAT and complies with 100+ countries' tax regulations (tax exempted in 100+ countries) -- See Avoidance of Double Taxation Agreements (DTAs): List of DTAs signed between Singapore and 100+ countries

Question 4: Do you accept my currency other than USD?

Answer: Yes. www.ChineseStandard.us -- GB/T 36624-2018 -- Click this link and select your country/currency to pay, the exact amount in your currency will be printed on the invoice. Full PDF will also be downloaded/emailed in 9 seconds.

How to buy and download a true PDF of English version of GB/T 36624-2018?

A step-by-step guide to download PDF of GB/T 36624-2018_EnglishStep 1: Visit website https://www.ChineseStandard.net (Pay in USD), or https://www.ChineseStandard.us (Pay in any currencies such as Euro, KRW, JPY, AUD).
Step 2: Search keyword "GB/T 36624-2018".
Step 3: Click "Add to Cart". If multiple PDFs are required, repeat steps 2 and 3 to add up to 12 PDFs to cart.
Step 4: Select payment option (Via payment agents Stripe or PayPal).
Step 5: Customize Tax Invoice -- Fill up your email etc.
Step 6: Click "Checkout".
Step 7: Make payment by credit card, PayPal, Google Pay etc. After the payment is completed and in 9 seconds, you will receive 2 emails attached with the purchased PDFs and PDF-invoice, respectively.
Step 8: Optional -- Go to download PDF.
Step 9: Optional -- Click Open/Download PDF to download PDFs and invoice.
See screenshots for above steps: Steps 1~3    Steps 4~6    Step 7    Step 8    Step 9